QUESTIONS GR 10-12
,SECTION A: SHORT QUESTIONS
QUESTION 1: Multiple Choice & Selection
(Original numbering Q1.1 - Q1.10 from various years)
1. Which function in a spreadsheet provides the current date and time? (1)
o A =NOW(Date&Time)
o B =Date() & Time()
o C =Now()
o D =Today()
2. Which of the following is NOT an input device? (1)
o A Speaker
o B Trackball
o C Fingerprint Scanner
o D Joystick
3. The attributes of a file can be set as hidden and read-only in (1)
o A File properties
o B File names
o C File extension
o D All of the above
4. Which one of the following is most likely to lead to an increase in the performance
of a computer? (1)
o A Installing a new anti-virus program.
o B Adding more RAM.
o C Adding a DVD Drive.
o D Increasing the refresh rate of the monitor.
5. The Digital Divide refers to (1)
o A the ability to understand the different technology options that are available to
all.
o B the gap that exists regarding the quality of the pixels on a monitor.
o C a new term used to describe the digital world of computers.
o D the gulf between those who already have access to computers and
the internet, and those who do not.
6. A trend in technology that allows for household appliances to be connected to
the internet: (1)
o A IoT
o B VoIP
o C https
o D IM
7. The main purpose of OCR is to produce a document so that it can be (1)
o A saved in PDF format.
o B edited and formatted.
o C saved as a picture.
o D sent via e-mail or IM.
8. You want to create a query in a database that matches the word Flat. Which one of
the following criteria will NOT give you the correct result? (1)
o A =”Flat”
o B “Flat”
o C =”F*”
o D Like “Flat”
9. When you run an update on your software applications this means that (1)
o A you uninstall and re-install the new programs to ensure that they are up to
date.
o B you only install the new features and improvements to existing
software when they become available.
o C you receive a new beta version of the software.
o D you need to create a backup program that will update software every night.
1
@studysmarterpro-stuvia
, 10.Which tag will you use to indicate the heading in a table in HTML? (1)
o A
o B
o C
o D
11.Which ONE of the following types of software allows you to try out a program before
you buy it? (1)
o A Freeware
o B Spyware
o C Shareware
o D Adware
12.You need to backup an entire hard drive. Which of the following devices is best
suited for this purpose? (1)
o A 32 GB Flash disk
o B 512 GB Portable hard drive
o C 64 GB Flash disk
o D 1 TB Cloud storage
13.Which ONE of the following is incorrect to complete the following statement: An
avatar refers to a user's … (1)
o A picture to identify a person in a 3D world.
o B computer version generated by a 3D world.
o C 3D object that is printed by a virtual world.
o D alter ego that is used online in a 3D world.
14.Which upgrade will most likely improve the performance of a computer? (1)
o A Installing a video capture card.
o B Adding more memory (RAM).
o C Adding a second hard drive.
o D Increasing the refresh rate of the monitor.
15.Identify the statement that is NOT correct. (1)
o A A network is a collection of connected computers.
o B A LAN can be used within one household.
o C Ethernet refers to wireless network technology only.
o D A WAN connects computers across cities, countries and continents with each
other.
16.Which ONE of the following options will display the symbol ‘A’ for a learner mark of
greater than 80 found in cell A1 of a spreadsheet? (1)
o A = IF (A1=80, “A”, “”)
o B = IF (A1=80, “”, “A”)
o C = IF (A1<80, “A”, “”)
o D = IF (A1>80, “A”, “”)
17.If an instruction is used repeatedly by a program, it is temporarily stored in a type of
memory called ... (1)
o A a register.
o B cache.
o C storage.
o D ROM.
18.Plug-and-play technology is used to … (1)
o A play games on a gaming console.
o B access the content of a CD.
o C detect and configure new devices.
o D install an operating system.
19.If the colour of an image displayed by a projector appears to be overall too light or
too dark, it may be corrected by changing the … of the projector. (1)
o A contrast
o B brightness
o C resolution
2
@studysmarterpro-stuvia
, o D position
20.A … could be used to input data instead of using the number keys on a keyboard. (1)
o A barcode scanner
o B touch pad
o C joystick
o D game controller
21.Which of the following functions result in an answer rounded down to the nearest
whole number? (1)
o A =AVERAGE(F1:F9)
o B =INT(18.3)
o C =TRUNC(10.05,1)
o D =ROUND(24.07,1)
22.Which ONE of the following features of a word-processing program can be used to
move quickly to a specific word or phrase in a document? (1)
o A Bookmark
o B Endnote
o C Formula
o D Caption
23.This type of file contains data which is most likely separated by commas: (1)
o A docx
o B xlsx
o C pptx
o D csv
24.The narrator in Windows is a(n) ... feature. (1)
o A security
o B update
o C accessibility
o D maintenance
25.Which one of the following actions WILL NOT protect data in a spreadsheet from
unauthorised access? (1)
o A Changing the colour of the font to transparent.
o B Restricting permissions in a workbook.
o C Encrypting the spreadsheet file.
o D Restricting permissions of the spreadsheet file.
26.A wireless keyboard CANNOT be connected to a computer using a/an ... (1)
o A infrared adapter.
o B 3G adapter.
o C Wi-Fi adapter.
o D Bluetooth adapter.
27.Which one of the following paragraph options in Word can be used to ensure that a
specified paragraph will always appear at the top of a new page? (1)
o A Keep with next
o B Widow/Orphan control
o C Keep lines together
o D Page break before
28.An internal hardware component that allows a computer to connect and
communicate via a network. (1)
o A HUB
o B ROMSwitch
o C Router
o D NIC
29.To print all comments and changes made in a document the following must be
enabled in the print dialog box. (1)
o A Print Selection only
o B Only print even pages
3
@studysmarterpro-stuvia
, o C Print Mark-up
o D Scale paper to size
30.______ is an acronym for the term used to describe human errors and their influence
on computer output. (1)
o A FOSS
o B SOHO
o C DIMM
o D GIGO
31.The overall design of an entire document including colours, fonts and effects is
known as: (1)
o A Style
o B Theme
o C Template
o D Auto-text
32.A technology where the processing power of multiple networked computers is
combined to perform a specific task. (1)
o A Cloud computing
o B Networking
o C Distributed computing
o D Big data
33.A small picture that provides a preview of a file without opening the file. (1)
o A Thumbnail
o B Spyware
o C Wizard
o D Microwaves
34.Which of the following is NOT a feature of a database program? (1)
o A Filter
o B Sort
o C Citation
o D Grouping
35.A higher resolution image means that the image ________ (1)
o A is made up of more pixels.
o B require less storage space.
o C contains less pixel information.
o D is made up of larger pixels.
36.The use of virtual reality (VR) technology may benefit the user as it (1)
o A requires specialised and expensive equipment.
o B may protect the user against cybercrime.
o C gives more information on a place being visited.
o D could be used for safer training in risky situations.
37.Fake news is when ___________ (1)
o A you are redirected to a false website without knowing it.
o B false and often sensational information is spread on social media.
o C the source of a message is hidden to make it appear legitimate.
o D are errors in the code that cause problems and make it unworkable.
38.Which one of the following Excel functions will always return an error message? (1)
o A =SUM(Total)
o B =LEN(a1&a2)
o C =TODAY()
o D =ROUND(A1)
39.Which one of the following pagination options can be used to stop a table in Word
from splitting across two pages? (1)
o A Keep with next
o B Widow / Orphan control
o C Page break before
4
@studysmarterpro-stuvia
, o D Keep lines together
40.A code in Access which forces data capturers to enter data in a specific format is
known as a ... (1)
o A validation rule
o B primary key
o C input mask
o D validation text
41.A malicious website that resembles a legitimate website, used to gather
usernames and passwords. (1)
o A Spoofing
o B Phishing
o C Pharming
o D Spamming
42.Which one of the following statements about word processing file types is FALSE?
(1)
o A Documents with a .rtf extension can be opened with most word processors.
o B If you save a Word document with a .txt extension, all formatting will be lost.
o C A Word document with a .docx extension can be saved as a PDF file.
o D Documents created and saved by newer versions of a word processor
can always be opened by an older version of the same word processor.
43.Which one of the following is NOT associated with the other options? (1)
o A Social Networking
o B Instagram
o C Vlogs
o D Digital Divide
44.Which one of the following devices has a specification measured in ppm? (1)
o A Printer
o B Monitor
o C Scanner
o D Digital Camera
5
@studysmarterpro-stuvia
,QUESTION 2: Selection (Term/Phrase/Function)
(Original numbering Q1.2 / Q2.1 from various years)
45.A (SOHO/personal) user would use database or accounting programs. (1)
o Answer: SOHO
46.Disk (scanner/defragmenter) is a utility program that assists in checking and repairing
a faulty hard drive. (1)
o Answer: scanner
47.(Virtual/Augmented) reality creates a whole new world for the user to experience.
(1)
o Answer: Virtual
48.The (BIOS/operating system) is responsible for performing the start-up procedures
when the computer is turned on. (1)
o Answer: BIOS
49.(DDR/EEP) RAM holds data and instructions during processing/execution. (1)
o Answer: DDR
50.The (CountA/Count) function counts the number of cells that contain values. (1)
o Answer: CountA
51.The maximum amount of data transmitted over an internet connection in a given
amount of time is known as (bandwidth/broad band). (1)
o Answer: bandwidth
52.(Pixel density/Resolution) represents the number of pixels that fit into a 1 inch
horizontal line. (1)
o Answer: Pixel density
53.A (virtual/augmented) reality adds to the real world that the user is viewing. (1)
o Answer: augmented
54.A (HDD/SSD) has no moving parts and is not as easily damaged should the device be
dropped. (1)
o Answer: SSD
55.(Ransomware/Cyber bullying) is a form of online harassment that might deter a
user from using a chat application or service as it makes them feel uncomfortable. (1)
o Answer: Cyber bullying
56.Bandwidth (throttling/consumption) is intentionally slowing down or limiting the
internet connection speed. (1)
o Answer: throttling
57.Mac OS is a(n) (open source/proprietary) operating system. (1)
o Answer: proprietary
58.(VGA/HDMI) cables transfer video and sound signals. (1)
o Answer: HDMI
59.(Disk Clean-up/Defragmentation) of the hard drive will make more space available.
(1)
o Answer: Disk Clean-up
60.(Flickr/Fixter) is a photo sharing, commenting, photography related
networking. (1)
o Answer: Flickr
61.When users are redirected to false websites without them even knowing is referred to
as (pharming/phishing). (1)
o Answer: Pharming
62.(Add-on/Plug-in) software, such as Flash Player, extends the capabilities of a
browser. (1)
o Answer: Plug-in
63.(Metadata/Betadata) is data providing information about one or more aspects of
the data. (1)
o Answer: Metadata
64.The (EULA / AUP) is a document containing the rights and responsibilities of users,
used mainly in a networking environment. (1)
6
@studysmarterpro-stuvia
, o Answer: AUP
65.a (UPS / UTP) is a type of networking cable. (1)
o Answer: UTP
66.(Capped / Uncapped) data is limited to a set amount of data per month. (1)
o Answer: Capped
67.(NFC / RFID) devices have the shortest range and is typically used for contactless
payments. (1)
o Answer: NFC
68.An (OLE Object / Validation Rule) is an example of a Data Type in Access. (1)
o Answer: OLE Object
QUESTION 3: Acronym Expansion
(Original numbering Q2.2 from various years)
69.Expand the acronym FTTH. (1)
o Answer: Fibre To The Home
70.Expand the acronym ISP. (1)
o Answer: Internet Service Provider
71.Expand the acronym PAN. (1)
o Answer: Personal Area Network
72.Expand the acronym RAM. (1)
o Answer: Random Access Memory
73.Expand the acronym GPS. (1)
o Answer: Global Positioning System
74.Expand the acronym POST. (1)
o Answer: Power on Self-Test
QUESTION 4: Matching / Definitions
(Original numbering Q2.6 - Q2.10, Q3.1 - Q3.5 from 2022; Q2.1, Q2.2 from
2024/2023/Prelim)
75.Provide an appropriate definition that would best describe Contrast Ratio. (1)
o Definition: The relationship between the darkest black and the brightest
white on a screen.
76.Provide an appropriate definition that would best describe Task Manager. (1)
o Definition: A system software program that monitors component
performance and provides information about the processes and
applications running on a computer..
77.Provide an appropriate definition that would best describe Metadata. (1)
o Definition: Data that provides information about other data. It
summarises basic information about data as a whole..
78.Provide an appropriate definition that would best describe Grid computing. (1)
o Definition: Group of networked computers which work together as a
virtual supercomputer to perform large tasks..
79.Provide an appropriate definition that would best describe BCC. (1)
o Definition: Blind Carbon Copy: an email recipient field which prevents
recipients from seeing each other’s email addresses..
80.A web protocol used by browsers and webservers to provide secure data transfer.
(1)
o Match: F. https.
81.A network that allows users to connect and communicate wirelessly. (1)
o Match: I. WLAN.
82.A malware program that “mines” your computer for confidential information.
(1)
o Match: A. Trojan.
83.The running of multiple sets of instructions on one computer at the same time. (1)
o Match: D. Multitasking.
7
@studysmarterpro-stuvia
, 84.The use of electromagnetic fields to automatically identify objects. (1)
o Match: K. RFID.
85.An accidental mistake in the code written by the programmers. (1)
o Match: E. Bug.
86.Software that is used to recognise text in a picture. (1)
o Match: H. OCR.
87.A message that is displayed when user input in a database table is invalid. (1)
o Match: G. Validation text.
88.A port that is used for the transfer of sound and video data. (1)
o Match: F. HDMI.
89.The … attribute in HTML specifies the distance between the border of a table cell
and the text in the cell. (1)
o Match: C. Cellpadding.
90.A software component that lets the operating system and a device communicate.
(1)
o Match: A. Driver.
91.A means of checking that an e-commerce website is legitimate. (1)
o Match: M. URL lock.
92.A spreadsheet function that will return a value of 8 when applied to the number
7.4. (1)
o Match: K. ROUNDUP.
93.… indicates that human error has an influence on the computer’s output. (1)
o Abbreviation: GIGO.
94.Machines that can perform tasks (autonomously) that would normally require human
action. (1)
o Abbreviation: AI.
95.… is the protocol for transferring hypertext (web) content over the internet. (1)
o Abbreviation: HTTP.
96.A/an … contains a transformer so that the motherboard will run at the correct voltage.
(1)
o Abbreviation: PSU.
97.… technology allows voice calls over the internet. (1)
o Abbreviation: VoIP.
98.Input device in smartphones and tablets, used to detect which way around the
device is held or how it is being moved. (1)
o Match: C. Accelerometer.
99.A spreadsheet function that extracts text data. (1)
o Match: K. MID.
100. Firmware containing instructions for the start-up of a computer. (1)
Match: J. BIOS.
101. Code that describes how a webpage is formatted in html. (1)
Match: G. Tags.
102. A biometric security measure that could control access to a user’s computer
or device. (1)
Match: F. Facial recognition.
103. The process of adding location information to a video file. (1)
Match: H. Geotagging.
104. A type of website that allows users to work together to create, add, delete or
modify the content. (1)
Match: F. Wiki.
105. Accessing a network without permission. (1)
Match: B. Hacking.
106. A situation where users are tricked into clicking on an item on a web page
which acts as a concealed link. (1)
Match: G. Click-jacking.
8
@studysmarterpro-stuvia
, 107. A utility that can be used to make more storage space available by deleting
unnecessary files. (1)
Match: A. Disk cleanup.
108. A module in which computer memory is supplied. (1)
Match: H. DIMM.
109. Allows users to interact with computers using visual objects such as icons
and buttons. (1)
Match: D. GUI.
110. A system of recording information in a way that makes it difficult to change,
hack or cheat the system. (1)
Match: A. Blockchain.
111. A method of sending emails to multiple people without them knowing who
else is receiving the email. (1)
Match: E. Bcc.
112. A malicious attempt to disrupt the normal traffic of a site / server by
overloading it with connection requests from botnets. (1)
Match: B. DDoS.
113. A network connection method commonly used by people who are taking
advantage of a BYOD policy. (1)
Match: K. WiFi.
114. Technology that provides high speed data over a wide area. (1)
Match: M. WiMax.
115. A version of software made available for testing and removing bugs,
before the software goes on sale. (1)
Match: Q. Beta.
116. A technology that makes geo-tagging possible. (1)
Match: N. GPS.
117. A downloadable update used to fix software bugs. (1)
Match: O. Patch.
9
@studysmarterpro-stuvia